A smart card enabled mobile personal computing environment system stores a user's personalized, fully functional, computing environment in a smart card. The user to specifies information required to configure the client to the user's preferred personal computing environment. The user's personal computing environment data is also used for interfacing with the user's web browser. As the user browses the web, the web pages are analyzed to determine if the web page is a logon or registration form. If the form is a registration form, the system fills in the form using the user's information from the user's personal computing environment data. If the form is a logon form, the system either captures the user's user name and password if the system has not recorded them, or inserts the user name and password in the form if the information for the web page is in the user's personal computing environment data.
|
11. A method, comprising:
reading a user's personal computing environment data from a transportable memory device in communication with a client device;
monitoring the user's web browser for web pages visited by a user on the client device;
wherein the monitoring step determines if a web page is a form and determines a format of the form; and
automatically filling in fields in the form using the user's personal computing environment data.
1. A method, comprising:
reading a user's personal computing environment data from a transportable memory device in communication with a client device;
monitoring Mozilla-based web browser activity;
wherein the browser monitoring step determines if a web page that the user visits is a form and determines a format of the form; and
analyzing fields in the form and automatically filling in fields in the form using the user's personal computing environment data.
15. An apparatus, comprising:
a module for reading a user's personal computing environment data from a transportable memory device in communication with a client device;
a module for monitoring the user's web browser for web pages visited by a user on the client device;
wherein the monitoring means determines if a web page is a form and determines the format of the form; and
a module for automatically filling in fields in the form using the user's personal computing environment data.
6. An apparatus, comprising:
a module for reading a user's personal computing environment data from a transportable memory device in communication with a client device;
a browser monitoring module on the client for monitoring Mozilla-based web browser activity;
wherein the browser monitoring module determines if a web page that the user visits is a form and determines a format of the form; and
a module for analyzing fields in the form and automatically filling in fields in the form using the user's personal computing environment data.
2. The method of
3. The method of
4. The method of
5. The method of
7. The apparatus of
8. The apparatus of
9. The apparatus of
10. The apparatus of
12. The method of
13. The method of
14. The method of
16. The apparatus of
17. The apparatus of
18. The apparatus of
|
This claims priority to Provisional U.S. Patent 29 No. 60/466,611, filed Apr. 30, 2003, the entire contents of which are incorporated herein by this reference, and is a Continuation In Part of U.S. patent application Ser. No. 09/796,847, filed on Feb. 28, 2001, the entire contents of which are incorporated herein by this reference, and which claims benefit of U.S. Provisional Patent Applications Ser. No. 60/185,276, filed on Feb. 28, 2000 and Ser. No. 60/185,278, filed on Feb. 28, 2000.
The current computing environment requires users, in general, to physically carry either a laptop or a notebook portable computer in order to maintain a fully functional, truly personalized, computing environment when moving from place to place. Because laptop and notebook computers, though physically small, are comparatively bulky and heavy, mobile computer users continuously seek ever smaller and lighter devices that will provide and maintain their personalized computing environment.
An example of such a smaller and lighter device that has recently enjoyed significant commercial popularity is the personal digital assistant (“PDA”). However, even though PDAs are smaller and lighter than laptop or notebook computers and provide a personalized computing environment, they do not presently offer the full functionality of desktop, laptop or notebook portable computers.
For example, when a PDA is removed from an environment in which a computer user has a fully functional computing environment, the PDA must first be loaded with an up-to-date image of data for pertinent portions of that environment, e.g., an address book, calendar, email, etc. Similarly, when a PDA returns to the fully functional computing environment, data in the PDA that has changed since leaving the fully functional computing environment must be transferred and/or synchronized from the PDA back into the user's regular computer and vice versa.
Desktop computers capable of accessing the Internet are ubiquitous in industrialized countries worldwide. A computer user, while traveling, can usually obtain access to such a computer and use that computer's Internet access to communicate worldwide. With sufficient data and appropriately configured, such computers could, in principle, provide mobile computer users with a fully functional personal computing environment. However, establishing a mobile computer user's fully functional computing environment at a remote or transitory location, e.g., in an airport kiosk or overnight lodging, requires error-free entry of a prodigious amount of highly detailed information to configure the local computer.
The amount of information required to configure a local computer so it provides the mobile computer user's fully functional, personal computing environment is disproportionately large in comparison with the benefit obtained. Consequently, there presently does not exist any convenient hardware and software that permits mobile computer users to move from computer to computer anywhere in the world, carrying with them their personalized, fully functional computing environment.
Presently, smart cards are used primarily for facilitating financial transactions. However, because smart cards include at least a limited amount of non-volatile readable and writeable memory and may also include a programmable processor, they inherently possess a capability for use in applications other than financial transactions. Storing data into a smart card, accessing that data, and activating a smart card's processor to execute a computer program all require that the smart card be interconnected with some type of reader/terminal. This characteristic of smart cards limits the potential for broadening their use for mobile computing applications because, in general, there does not presently exist an infrastructure that supports the use of smart cards for applications other than financial transactions.
It would be advantageous to provide a personal computing environment using Mozilla that allows a user to store and transport his personal computing environment in a smart card and to use the smart card to configure the computing environment of a computer. It would further be advantageous to provide a personal computing environment using Mozilla that automatically interfaces with the user's browser to fill in logon and registration forms using the user's personal computing environment data on a smart card.
The invention provides a personal computing environment using Mozilla. The system allows a user to store, transport, and configure his personal computing environment via a smart card. In addition, the invention automatically interfaces with the user's browser to fill in logon and registration forms using the user's personal computing environment data on a smart card.
An embodiment of the invention stores a user's personalized, fully functional, computing environment in a smart card. A user information database is provided that is resident on a server and contains the user records of a plurality of users. Each of the user records contains personal computing environment data. The amount of data in the user record is generally larger than the storage capacity of a smart card.
An embodiment allows the user to specify the information required to configure the client to the user's preferred personal computing environment. If the correct personal computing environment data is not resident in the smart card, the client queries the server for the information needed and updates the smart card with the new data. If the smart card memory is filled, then the client will remove old indices from the smart card in a least-recently used method until there is enough room to add the new data.
The user's personal computing environment data is also used for interfacing with the user's Web browser. As the user browses the Web, the Web pages are analyzed to determine if the Web page is a logon or registration form. If the form is a registration form, the system fills in the form using the user's information from the user's personal computing environment data. If the form is a logon form, the system either captures the user's user name and password if the system has not recorded them, or inserts the user name and password in the form if the system finds the user name and password for the Web page in the user's personal computing environment data.
The user can also manage his personal computing environment data stored on the smart card and the user information database. The user is allowed to increase the size of his user records to store more information and to create sets of personal computing environment data.
The server gives the client access to the user's records through a secure Web site. The user accesses his data, adds, modifies, and/or deletes information and transfers data to his smart card via the secure Web site.
A plurality of servers with redundant copies of the user information database is used in case of any server failures. One of the servers is designated the main local server of the user based on the user's usage patterns. The client performs load balancing among the servers when obtaining data and will automatically switch to another server if the main server fails or is otherwise inaccessible.
Other aspects and advantages of the invention will become apparent from the following detailed description in combination with the accompanying drawings, illustrating, by way of example, the principles of the invention.
The invention is embodied in a personal computing environment using Mozilla. A system according to the invention allows a user to store, transport, and configure his personal computing environment via a smart card. In addition, the invention automatically interfaces with the user's browser to fill in logon and registration forms using the user's personal computing environment data on a smart card.
The invention provides a mobile computer user with a system that is extremely compact, and yet permits the user to carry with him sufficient machine-readable data to easily establish his fully functional mobile personal computing environment anywhere in the world.
One of the difficulties encountered when dealing with Mozilla-based browsers is how the components perform data transactions with external programs. Another difficulty is how to control the browser's events. An embodiment of the invention resolves theses two difficulties and combines the solutions to provide a method for third parties that develop external programs to control Mozilla-based browsers.
An embodiment of the invention stores, in a smart card, sufficient information to permit characterizing a mobile computer user's personalized, fully functional computing environment. The information that the mobile personal computing environment supplies may differ from system to system. However, the amount of information stored in the smart card is sufficient to create a consistent computing environment for the user. Information such as operating system preferences, favorite Web sites, email addresses, credit card information, ISP information, program preferences, program environments, etc. are stored in the smart card.
Referring to
The invention checks the smart card to determine if the specified data is present in the smart card's local memory 105. If the specified data is in the smart card's memory, then the invention retrieves the data from the smart card for subsequent use by the invention 106. If the specified data is not in the smart card's memory, then the invention accesses, via the Internet or other method, a secure server that stores additional data which more fully characterizes the mobile computer user's personalized, fully functional computing environment 108. The invention then retrieves the specified data from the server for subsequent use by the invention 109 and updates the smart card data 110. If the data is not on the server 108, then it is new data from the user which must be recorded and used to access the Internet 111.
With respect to
Using the data constructed in this way, the invention then builds a URL command and sends it to the Internet 203. The URL, username, password and Internet site bookmark data, if complete, permit the mobile computer user to log onto the specified Internet site 204 and proceed immediately to a specified page at that Internet site 205. If some information is incorrect or incomplete, interacting with the Internet site accessed by the URL, the mobile computer user can either enter, as required, the username, password, and Internet page data to access a desired Internet page 207, 208, or may supply that information through a graphical user interface (GUI) that provides a drag and drop capability 210, 211.
Referring to
After linking to the specified Internet site and updating the computing environment information stored at the server 306, the invention attempts to update the indices stored on the user's smart card connected to his computer 307. If the smart card memory is full 309, then one record is deleted from those stored in the smart card until the smart card has sufficient free memory to store the updated indices 311, the updated index is then written into the smart card's memory 310. Otherwise, if the smart card memory is not full 309, then the updated indices are immediately stored on the smart card 310. In addition to saving the updated indices on the smart card, the server also saves the updated index in its database which characterizes this mobile computer user's mobile personal environment 308.
If the amount of unused storage in the server's database is sufficient to store the updated indices 312, then the information is stored in the database 313. Otherwise, the server first offers the user an opportunity to allocate more server storage for his indices 314. If the user declines the offer of additional storage, then the server deletes one record from the database until the server has sufficient free memory to store the updated indices 316. The server then adds the updated index to the indices stored in the database 315. If the user accepts the offer of additional storage 314, then the new index is added to the server's database 315. The mobile computer user is able to initially specify and, as required, update data that characterizes his mobile personal environment.
The user is allowed to create sets of indices when storing a larger amount of information on the server than is available on the user's smart card. The user can then choose between different sets of information to be downloaded to his smart card. For example, the user can set his smart card to his personalized mobile computer environment for his U.S. office, foreign office, or even his home. This allows the user to characterize each separate and distinct computer system that he uses.
One skilled in the art will readily appreciate that although the mobile computer user's personalized computer environment is specifically mentioned above, any other type of information, such as personal data, financial data, operating system, computer personality, video and/or audio data, etc., are easily substituted in its place.
With respect to
Referring to
With respect to
Another preferred embodiment of the invention adds a backup server 609 that contains a consistent copy of the entire user database 606 served by the main server 602. If the main server 602 fails, the backup server 609 takes over. The backup server's database 610 and external interface 611 are identical to the main server's 602 components.
Additionally, a plurality of servers can be used along with load balancing, to handle large amounts of client requests. The client can perform its own load balancing among the servers by using, for example, the response time (RTT) from each server to determine the best choice. If the main server serving the user fails or is otherwise inaccessible, then the client will automatically switch to another server.
Referring to
The invention allows mobile computer users to carry, on a single smart card, all the information required to characterize their mobile personal environment and to quickly establish their mobile personal environment anywhere in the world.
With respect to
The user can also manage the indices stored on his Smart Card 805 and the Server Database 811. The Server Interface module 801 communicates with the secure server containing the user's information. The communication is through the secure Web site provided by the Manage User Information module 807 on the server. The Manage User Information module 807 displays the user's indices stored on the Server Database 811. The user requests his indices through the secure Web site. His indices are retrieved from the Server Database 811 by the Lookup User Information module 810. The Lookup User Information module 810 relays the index information to the Manage User Information module 807. The indices resident on the user's Smart Card 805 are sent to the Manage User Information module 807 through the Server Interface 801. The smart card indices are compared with the user's indices from the Server Database 811 by the Compare User Information module 808, which correlates and compares any differences between the two sources. The Manage User Information module 807 displays the information to the user through a secure Web page.
The user can create (for new users), add, delete, and update his indices through the User Interface module 802 connection to the secure Web page. The Server Database 811 indices are updated through the Update User Record module 809. Smart Card indices are updated by the Manage User Information module 807 through the Server Interface 801. The Server Interface 801 sends the update information to the Update Smart Card module 804. The Update Smart Card module 804 writes the information to the Smart Card 805 through the Read/Write Smart Card Module 803.
In the case of multiple servers, the Server Database 811 is redundantly stored among other servers. The Server Database 811 is updated with information from other servers by the Manage Server Database module 812. Any new updates to the Server Database 811 that are initiated locally are sent out to other servers by the Manage Server Database module 812.
Additionally, any transfers of user index records from one server to a more local server (in case of the user relocating to another location) is performed by the Manage Server Database module 812.
Referring to
Once the user's indices are received by the Manage User Information module 901, the client can disconnect from the server and the user manages his indices offline with the client. The Compare User Information module 907 operates in the same manner as described above. The information obtained from the Server Database 911 and the Smart Card 905 are displayed to the user through the User Interface 902. After the user has updated his indices and any changes to the user's records on the Server Database 911 are required, the client reconnects with the server's Client Interface 908. The Server Database 911 is updated with any changes by the Update User Record module 909.
Yet another preferred embodiment of the invention encrypts the entire Server Database 911. Each user record is individually encrypted such that if one user record is accessed and decrypted by a hacker, the other user records will not be compromised in any way. The actual encryption of a user record is performed by the client. The Manage User Information module 901 retrieves the user's encrypted record from the server. If this fails, then the user must create a new record to access. The server looks up, using the Smart Card's 905 ID, and retrieves the user's record through the Lookup User Information module 910. The server does not know what the contents of the record are, only that the record belongs to the user (much like a safety deposit box). The record is sent back to the client via the Client Interface module 908.
The Manage User Information module 901 decrypts the user record using the Smart Card 905 encryption key information stored in the Smart Card 905. Each smart card is unique and the encryption key only exists on a particular smart card and not on the server. Once the user has completed any changes to the indices in the record, the Manage User Information module 901 encrypts the user record using the encryption key on the Smart Card 905 and sends the record back to the server. The Client Interface module 908 sends the encrypted record to the Update User Record module 909 which replaces the user record in the Server Database 911 with the new encrypted user record.
This approach ensures that there is a one-to-one mapping of user records to smart cards; each user record in the Server Database 911 can only be decrypted by a specific smart card. It also ensures that the Server Database 911 is secure and cannot be easily compromised. The intruder would have to physically have every existing smart card to crack the entire database.
If a user loses his smart card, then there is a procedure where the smart card can be morphed, or recreated. The user inserts a new Smart Card 905 into the client system. The system through the User Interface module 902 has the user enter in his personal information in the same manner as when he first created his original smart card. The new Smart Card 905 is then initialized and the encryption key is recreated. The new smart card's ID is sent to the Client Interface module 908 from the User Interface module 902 via the Manage User Information module 901. The Update User Record module 909 removes the original smart card's ID from the user's record on the Server Database 911 and replaces it with the new smart card's ID. Once that is completed, the User Interface module 902 then places the encryption key in the new Smart Card 905 via the Read/Write Smart Card module 903. The user's smart card has now been recreated and the original smart card disabled.
The server has the ability to simultaneously perform the server functions described in
One skilled in the art will readily appreciate that although the client and server functionality are described separately above, both the client and server can reside on the same physical machine.
Mozilla Interface
An embodiment of the invention supports Mozilla Web Engine based Browsers, such as Netscape 6.XX and above, Mozilla, Compuserve, and other browsers.
The embodiment adds security protection to Web browsing. The user inserts his smart card into a connected smart card reader. The invention follows the user through his Web browsing sessions and looks for forms, such as log in, registration, and ecommerce forms, that need to be filled in with the user's personal information. The user's personal information is stored in the user's smart card.
The forms are analyzed by the system to identify the type of form displayed and the information needed to fill the form.
The system uses the information on the user's smart card to perform logins and form filling. This allows the user to switch between computers without having to worry about remembering or typing in personal information. The user is also assured that his personal information is always with him whenever he carries his smart card (or smart credit card, etc.).
The system changes Mozilla's original depressed file, “comm.jar”. This file consists of many script files. Script files are added into the Mozilla file and some of the existing script files are modified. The additions and modifications allow the system to control Mozilla's events. For example, “navigator.xul” is modified so when Mozilla is loaded, it will run the system's program and load the system's component (nsPlatiMozui). The files “Navigator.js”, “contentAreaClick.js”, “browser.js” and others are modified so the system can control the events and set the data that it wants.
A component is added to the Mozilla engine. The component is named “nsPlatiMozui” and it is an XPCOM (Cross Platform COM) object. The component uses an XPIDL interface and provides some attributes and functions that Mozilla will use. After the component is registered into Mozilla's registry by using regxpcom.exe it can used by Mozilla. When Mozilla is loaded during runtime, Mozilla will also load the component (nsPlatiMozUi.dll).
Referring to
The nsPlatiMozui component 1007 resolves this problem. The nsPlatiMozui component 1007 loads another DLL that provides a shared memory component. The configure client module 1003 also loads this DLL, so the configure client module 1003 can use the shared memory to perform data transactions with the nsPlatiMozui component. The nsPlatiMozui component uses a hidden window to interact with the configure client module 1003 and Mozilla 1005.
The nsPlatiMozUi component 1007 is an XPCOM (cross platform com) component. Its dynamic link library is named “nsPlatiMozUi.dll”. After the nsPlatiMozUi component 1007 is registered by using regxpcom.exe, it is then available for use by the Mozilla browsers.
The nsPlatiMozUi component 1007 also loads another dynamic link library named “PlatiMozUi.dll” component 1006. This DLL provides a shared memory that the configure client module 1003, nsPlatiMozUi.dll, and other programs can use. The PlatiMozUi.dll 1006 also loads the Source Analyzing Engine (“PlatiAnaSrc.dll”) to analyze the Mozilla browser's 1005 Web page's HTML source code.
Once the configure client module 1003 is loaded, the configure client module 1003 will use the PlatiMozUi.dll's 1006 functions to set its window handle in the shared memory.
When the Netscape 6.XX or upper version browser 1005 is loaded, the script files in “comm.jar” will execute to load the nsPlatiMozui component 1007. The nsPlatiMozui component 1007 loads PlatiMozUi.dll 1006.
As the browser 1005 completes a user's navigation, the script files in “comm.jar” will check if there is a form in the Web page and what kind of form it is.
If the form is a logon form or Registration form, the nsPlatiMozui component 1007 uses the PlatiMozUi.dll's 1006 functions to the check the configure client module's handle in the shared memory. If the configure client module 1003 is not loaded, the nsPlatiMozui component 1007 will do nothing, otherwise, the nsPlatiMozui component 1007 launches a hidden window.
The hidden window sends the configure client module's window informational messages. The message is different depending on what type (format) of form the form is, e.g., a logon or registration form. The configure client module 1003 acts when it receives the message, either to check if the configure client module 1003 has already recorded the account information for the Web site or to send the user's information back to the nsPlatiMozui component 1007. The configure client module 1003 will set data in the shared memory indicating the user's information and status via the hidden window. The hidden window places the data in the shared memory 1004 when it receives the message from the configure client module 1003.
If the form is a registration form, the nsPlatiMozui component 1007 fills in the user's information, such as the user's first name and last name, in the form that it obtains form the shared memory 1004. If the form is a logon form, the nsPlatiMozui component 1007 either captures the user's user name and password if the configure client module 1003 has not recorded them, or inserts the user name and password in the form if the configure client module 1003 has already recorded them (the nsPlatiMozui component 1007 finds the user name and password in the shared memory 1004).
If the nsPlatiMozui component 1007 captures the user's user name and password, it passes the information to the configure client module 1003 via the shared memory 1004 by sending a message to the configure client module's window. The configure client module 1003 passes the user's user name and password from the shared memory 1004 to the read/write smart card module 1002. The read/write smart card module 1002 saves the information to the smart card 1001 if the user desires.
One skilled in the art will readily appreciate that although Mozilla-based browsers are mentioned above, that other types of browsers can be similarly used to achieve the same results.
Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention. Accordingly, the invention should only be limited by the claims included below.
Patent | Priority | Assignee | Title |
8561908, | Aug 31 2005 | Felica Networks, Inc. | Information processing system, clients, server, programs and information processing method |
9729674, | Aug 31 2005 | Felica Networks, Inc. | Information processing system, clients, server, programs and information processing method |
Patent | Priority | Assignee | Title |
4885778, | Nov 30 1984 | EMC Corporation | Method and apparatus for synchronizing generation of separate, free running, time dependent equipment |
5146499, | Oct 27 1989 | De La Rue Cartes et Systemes SAS | Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such system, and a procedure for implementing such authentification |
5944794, | Sep 30 1994 | Kabushiki Kaisha Toshiba | User identification data management scheme for networking computer systems using wide area network |
5983273, | Sep 16 1997 | Microsoft Technology Licensing, LLC | Method and apparatus for providing physical security for a user account and providing access to the user's environment and preferences |
5995965, | Nov 18 1996 | Humetrix, Inc. | System and method for remotely accessing user data records |
6038551, | Mar 11 1996 | Microsoft Technology Licensing, LLC | System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer |
6044382, | May 19 1995 | CYBERFONE SYSTEMS, LLC | Data transaction assembly server |
6055512, | Jul 08 1997 | Nortel Networks Limited | Networked personal customized information and facility services |
6141752, | May 05 1998 | Comcast Cable Communications Management, LLC | Mechanism for facilitating secure storage and retrieval of information on a smart card by an internet service provider using various network computer client devices |
6161176, | Nov 20 1998 | Microsoft Technology Licensing, LLC | System and method for storing configuration settings for transfer from a first system to a second system |
6170064, | Oct 13 1997 | Samsung Electronics Co., Ltd. | Computer and a method for displaying the time of using system |
6182212, | Dec 14 1998 | Lenovo PC International | Method and system for automated migration of user settings to a replacement computer system |
6199114, | Sep 16 1997 | Microsoft Technology Licensing, LLC | Initiating a user session at an internet terminal using a smart card |
6260111, | Aug 15 1997 | International Business Machines Corporation | System and method for network power management incorporating user identity and preferences via a power managed smart card |
6292827, | Jun 20 1997 | SHORE TECHNOLOGIES 1999 INC | Information transfer systems and method with dynamic distribution of data, control and management of information |
6353448, | May 16 2000 | EZ Online Network, Inc. | Graphic user interface display method |
6370646, | Feb 16 2000 | CA, INC | Method and apparatus for multiplatform migration |
6438550, | Dec 10 1998 | International Business Machines Corporation | Method and apparatus for client authentication and application configuration via smart cards |
6490601, | Jan 15 1999 | Liberty Peak Ventures, LLC | Server for enabling the automatic insertion of data into electronic forms on a user computer |
6539479, | Jul 15 1997 | The Board of Trustees of the Leland Stanford Junior University | System and method for securely logging onto a remotely located computer |
6581162, | Dec 31 1996 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method for securely creating, storing and using encryption keys in a computer system |
6611914, | Mar 06 1998 | Samsung Electronics Co., Ltd.; SAMSUNG ELECTRONICS CO , LTD | Security card check type computer security system method |
6618810, | May 27 1999 | Dell USA, L.P. | Bios based method to disable and re-enable computers |
6678824, | Nov 02 1999 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Application usage time limiter |
6711687, | Nov 05 1998 | Fujitsu Limited | Security monitoring apparatus based on access log and method thereof |
6738901, | Dec 15 1999 | 3M Innovative Properties Company | Smart card controlled internet access |
6751671, | Aug 13 1998 | CP8 Technologies | Method of communication between a user station and a network, in particular such as internet, and implementing architecture |
6944650, | Mar 15 1999 | CP8 Technologies | System for accessing an object using a “web” browser co-operating with a smart card |
7047558, | Oct 28 1999 | CP8 Technologies | Secure terminal provided with a smart card reader designed to communicate with a server via an internet network |
7111321, | Jan 25 1999 | Dell Products L P | Portable computer system with hierarchical and token-based security policies |
20020004783, | |||
20020029254, | |||
20020174235, | |||
20030001016, | |||
20030196085, | |||
20040230536, | |||
GB2324395, | |||
WO9729416, | |||
WO9826344, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 29 2004 | O2 Micro International Limited | (assignment on the face of the patent) | / | |||
Apr 29 2004 | KUO, CHIH JEN | 360 DEGREE WEB, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015298 | /0739 | |
Apr 29 2004 | LUO, WEI | 360 DEGREE WEB, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015298 | /0739 | |
Apr 22 2008 | 360 DEGREE WEB, INC | O2Micro International Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 020913 | /0123 |
Date | Maintenance Fee Events |
Mar 02 2012 | M2551: Payment of Maintenance Fee, 4th Yr, Small Entity. |
Aug 15 2012 | M1559: Payment of Maintenance Fee under 1.28(c). |
Oct 05 2012 | STOL: Pat Hldr no Longer Claims Small Ent Stat |
Apr 15 2016 | REM: Maintenance Fee Reminder Mailed. |
Sep 02 2016 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Sep 02 2011 | 4 years fee payment window open |
Mar 02 2012 | 6 months grace period start (w surcharge) |
Sep 02 2012 | patent expiry (for year 4) |
Sep 02 2014 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 02 2015 | 8 years fee payment window open |
Mar 02 2016 | 6 months grace period start (w surcharge) |
Sep 02 2016 | patent expiry (for year 8) |
Sep 02 2018 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 02 2019 | 12 years fee payment window open |
Mar 02 2020 | 6 months grace period start (w surcharge) |
Sep 02 2020 | patent expiry (for year 12) |
Sep 02 2022 | 2 years to revive unintentionally abandoned end. (for year 12) |